You have recently joined in an academic programme to learn more about

programming. You have learnt a few programmes. Your teacher has now given you a

number of tasks to complete.


a) Explain the concept of an algorithm and describe common algorithmic

techniques and solutions.

b)Create a flowchart from the following algorithm.

Step 1: Input VALUE1, VALUE2

Step 2: if (VALUE1 > VALUE2) then

MAX VALUE1

else

MAX VALUE2

endif

Step 3: Print “The largest value is”, MAX

Answers

Answer 1

The concept of an algorithm simply refers to the procedure that is used in problem-solving.

The description of the common algorithmic techniques and solutions are:

Brute-force or exhaustive search.Divide and Conquer.Greedy Algorithms.Dynamic Programming.Branch and Bound Algorithm.Randomized Algorithm.Backtracking.

The sample flowchart:

START

Input

VALUE1,VALUE2

is

VALUE1>VALUE2

If yes

MAX  VALUE1

If no

MAX  VALUE2

Print

“The largest value is”, MAX

STOP

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1


Related Questions

The ability for new computers to be automatically connected to the network is provided by the:________

Answers

Answer:

DHCP server

Explanation:

What tool allows you to discover, cleanse, and transform data with built-in operations?

Answers

Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

What is meant by data cleaning?

Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.

Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.

Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that  allows a person to discover, cleanse, and transform data using built-in operations.

Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

Learn more about data cleaning from

https://brainly.com/question/13085801

#SPJ1

A technician wants to replace a failing power supply on a high-end gaming computer. which form factor should the technician be looking for?

Answers

A technician need to use the form factor or the  technician be looking for what we call EPS12V.

What is an EPS power connector?

The EPS connector is known to be used to supply power to the  motherboard CPU socket and the PCI is known to be one that functions to express connector.

Note that this is said to be a server standard (EPS12V) and it is also known to be one that can be said to be a desktop standard (ATX12V).

Note that the EPS12V is one that is known to always be seen in an 8-pin CPU connector and therefore, A technician need to use the form factor or the  technician be looking for what we call EPS12V.

Learn more about technician from

https://brainly.com/question/2328085

#SPJ1

which things computer case contains

Answers

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

What is a computer case?

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

the three basic steps of a CPU are fetch, decode, and execute. Some experts describe this cycle as simply “fetch-execute.” Do you think the three-step description or the two-step description provides a better explanation of how a CPU works? Why?.

Answers

I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

What is the cycle about?

The basic operation of any system is known to be the ‘fetch-execute’ cycle.  It is said to be one that fetches the instructions usually from the central memory and then it is said to executes them.

Note that

The CPU fetches the instructions.The CPU also decodes the instruction.The CPU also executes the instruction.

Hence, I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

Learn more about fetch-execute cycle  from

https://brainly.com/question/9964445

#SPJ1

This is an error identified by the compiler.
a. syntax error
b. logic error
c. debugging error
d. black box testing error

Answers

Explanation:

When developing programs there are three types of error that can occur: syntax errors. logic errors. runtime errors.

The presence of a lock icon next to an item on the lenovo support site denotes a restricted document or utility. What information on lenovo support is considered restricted?

Answers

The information on Lenovo support which are considered restricted include the following:

BIOS toolsConfidential tips.Known issues for Contact Centers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed by a tech company such as Lenovo, to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is a classified source material?

A classified source material can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

In this context, we can infer and logically deduce that the information on Lenovo support which are considered restricted include the following:

BIOS toolsConfidential tips.Known issues for Contact Centers.

Read more on classified source material here: https://brainly.com/question/15346759

#SPJ1

What uses techniques that create models indicating the best decision to make or course of action to take?
a. predictive analytics
b. descriptive analytics
c. prescriptive analytics

Answers

Prescriptive Analytics uses techniques that create models indicating the best decision to make or course of action to take.

What is Prescriptive Analytics?

Prescriptive Analytics is an approach used to analyze and examine collected information by raising how to use these data at an advanced level.

This type of analytic approach (Prescriptive Analytics) may be very useful in different fields and applications such as, for example, in pharmaceutical settings in order to discover how a compound may alter a given signaling pathway.

In conclusion, Prescriptive Analytics uses techniques that create models indicating the best decision to make or course of action to take.

Learn more about Prescriptive Analytics here:

https://brainly.com/question/18484504

#SPJ1

What are the different types of topology?​ in details

Answers

Answer:

NETWORK TOPOLOGY .

This tefers to how nodes are connected to the network.

Types of topology.

Physical topology.Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

Bus topologyTree topologyHybrid topologyStar topologyRing topology.

Hope it helps you,any question so far...comment !!!

[tex]\huge\mathcal{♨ANSWER♥}[/tex]

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

Bus topologyRing topologyStar topologyMesh topologyTree topology

♻Bus topology

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

♻Ring topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

♻Star topology

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

♻Mesh topology

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

♻Tree topology

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

...hope this helps...

_♡_mashi_♡_

The keyword __________ is required to declare a class.
a. public
b. private
c. class
d. all of the above

Answers

Answer is b-private

Answer:  b. private

Explanation:

in which year computer was invented

Answers

The first computer was invented by Charles Babbage, in 1822, but was not built until 1991

A _____ standard describes the requirements for obtaining a domain name for use by external parties?

Answers

A DNS control standard describes the requirements for obtaining a domain name for use by external parties.

What is a domain name?

A domain name is a name that is easy and easy to remember. The name is used for online websites for companies or vlogs that contain an IP address on the internet. It is like the street address.

The DNS control system is a system that is used by every domain name user. It controls how visitors would see the website and how they will receive emails.

Thus, the standard requirement for obtaining a domain name is the DNS control standard.

To learn more about the domain name, refer to the below link:

https://brainly.com/question/3044569

#SPJ1

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

Answers

A network monitoring method (technique) which can be used to ensure that all traffic sent to any port on a switch is also sent to a network device that is connected to the mirrored port is referred to as port mirroring.

What is a content switch?

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

What is port mirroring?

Port mirroring can be defined as a network monitoring method (technique) which is designed and developed to ensure that all traffic that are sent to any port on a switch, is also sent to a network device that is connected to the mirrored port.

In this context, we can infer and logically deduce that the network monitoring method used is referred to as port mirroring.

Read more on switches here: brainly.com/question/14850209

#SPJ1

After programs are put into production, making necessary changes is called?

Answers

Answer:

it's called maintenance

What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?

Answers

Explanation:

A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.

We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.

In what document does the program manager (pm) address the demilitarization and disposal requirements?

Answers

Life Cycle Sustainment Plan (LCSP) is the document that the program manager (pm) addresses the demilitarization and disposal requirements.

What is Life Cycle Sustainment Plan?

Life Cycle Sustainment Plan is a plan or service that works during the trade of weapons or system work regarding militarization. This system works on the development and handling of the weapon system.

So, Life Cycle Sustainment Plan will be used in the demilitarization and management requirements.

Thus, the name of the document program is Life Cycle Sustainment Plan.

To learn more about Life Cycle Sustainment Plan, refer to the below link:

https://brainly.com/question/1272845?referrer=searchResults

#SPJ1

What fully capitalizes on connectivity, system integration, and the information-producing capabilities of smart devices?

Answers

Digital supply chain  fully capitalizes on connectivity, system integration, and the information-producing capabilities of smart devices.

What is digital supply chain?

The term digital supply chain can be defined as the set of methods as well as processes that are used by advanced technologies in order to get better insights in business.

The way that the digital supply chain helps is that it helps to ensure that the participants are well able to make better decisions from the information that they have available.

Hence we can say that Digital supply chain  fully capitalizes on connectivity, system integration, and the information-producing capabilities of smart devices.

Read more on supply chain here: https://brainly.com/question/25160870

#SPJ1

Which principle or element of layout design is highlighted in this event poster?
i. a headline
ii. a column
iii. a sub-headline
iv. a caption

Answers

The  principle or element of layout design is highlighted in an event poster in option i: The headline.

What are the elements of page layout?

The poster is known to be one that often uses a kind of hierarchy and centered text alignment as its element.

Note that it is one whose Lines of use is said to be made up of different kinds of type styles, sizes and others.

The simple elements of an advertising poster is made up of:

1. The headline.

2. The sub-head.

3. The body copy.

4. The caption.

The elements of page layout are visual hierarchy, visual flow, and others. Hence, the  principle or element of layout design is highlighted in an event poster in option i: The headline.

Learn more about layout design from

https://brainly.com/question/2501083

#SPJ1

The types of ____ systems used with personal and business computers today include smart cards.

Answers

Answer:

Storage.

Explanation:

I ran into this question before

Answer:

Storage

Explanation:

I've seen this question in a quiz before.

14. How do digital libraries address the problem of digital exclusion?
O A. They allow web conferencing so people may connect with friends and relatives.
OB. They make it worse because digitally illiterate people are unable to read books.
O C. They reach out to people who need technology and help teach them digital literacy skills.
O D. They provide free virus protection to people who need it most.

Answers

The digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

What does it mean to be digitally excluded?

The  digital exclusion  is known to be also as digital divide and this is known to be where a part of the population is known to possess a continuous and unequal access and capacity in regards to the use Information and Communications Technologies (ICT),

Note that IT are very essential for all to be fully participated  in the society and the digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

Learn more about digital exclusion from

https://brainly.com/question/7478471

#SPJ1

Which example best describes an unethical use of computers? A. Sidney uses a computer to create a website that allows them to share personal writing and art. B. Jill leaves her computer on during lunch. Her supervisor opens and reads an email addressed to her. C. Trang uses a computer to collaborate with friends on a group project for school. O D. Sanjay uses a computer to order groceries online and have them delivered to his home.​

Answers

Answer is B

Explanation: Common Sense

Answer:

B

Explanation:

Create a timeline of the evolution of computers and their impact on society

Answers

While the conceptual idea after a computer was developed in the 19th century, the first electronic computer was created in the 1940s.

How does the evolution of computers impacts the society?

Computers have transformed the way people relate to one another and their living environment, as well as how humans manage their work, their communities, and their time. Society, in turn, has affected the development of computers via the needs people have for processing data.

What are the evolution of computers?

The first modern computer was built in the 1930s and was called the Z1, which was followed by large machinery that took up whole rooms. In the '60s, computers evolved from professional use to private use, as the first personal computer was presented to the public.

To learn more about computers, refer

https://brainly.com/question/24540334

#SPJ9

What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?

Answers

An implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is referred to as: D. phased implementation.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

Generally, an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is commonly referred to as phased implementation.

Read more on phased implementation here: https://brainly.com/question/7112675

#SPJ1

Complete Question:

What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?

A. Direct cutover

B. Pilot implementation

C. Parallel operation

D. Phased implementation

define the following: electronic mail, E-mail attachment, E-mail address, address book​

Answers

Answer:

Explanation:

electronic mailbox

a document, picture or  in an email

an address for your email : example at something . something

a book of email addresses

will you mark me as brainlest? I am trying to get a higher rank

Write any two uses of the paint program

Answers

Image reformatting - For instance, modifying a GIF to a JPEG. Drawing shapes. Resize and rotate images. Basic image editing such as red eye and difference

A paintbrush is utilized for drawing, coloring, and editing the pictures. We can use Paint Brush like a digital sketchpad to make straightforward pictures. Files created in Paint Brush are saved as bitmap files.

What are the main features of the paint program?

Features contained in the paint are pencil, brush and airbrush tool. The capability to add text, lines and shapes. Also contained are an eraser, magnifier, and fill colour tools.

What is the use of paint program?

A paint program is a software pictures program that allows the user to draw, color, or paint bitmapped images on a computer. Though most are finished, examples include: KolourPaint, XPaint, Deluxe Paint, MacPaint, and Microsoft Paint, which is displayed in the picture

To learn more about paint program, refer

https://brainly.com/question/1407666

#SPJ9

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered:

Answers

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very  Essential for any computer.

What is  password Essential for any computer?

The use of the  Passwords is known to be a tool that can help to give or provide the first kind of defense that a person can often use against unauthorized access to one's computer and personal information.

Note that the stronger a password is, the more protected one can say that your system or computer will be from any kind of hackers and malicious software.

Therefore, Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very  Essential for any computer.

See full question below

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered: Essential for any computer. Necessary to consider, because physical security is always something that must be evaluated.

Learn more about password from

https://brainly.com/question/17174600

#SPJ1

9. The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

Answers

Answer:

The map/reduce program component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

1.1 give five (5) reasons why modeling is an important part of system analysis and design

Answers

Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

What is Modeling?

In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.

Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.

In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

Learn more about modeling here:

https://brainly.com/question/17994947

#SPJ1

You are a business consultant troubleshooting a failed information system. You discover that employees face negative incentives to using the system. Which component is causing the failure?

Answers

Given that the  employees face negative incentives to using the system the system component that is responsible for this failure can be said to be the people.

What is a component failure?

This is the term that is used to refer to the failure of a group of components at a particular period of time. This is usually the statistical probability of failure.

In a situation where the failure is due to the fact that the employees face negative incentives to using the system we can know the reason for such a failure is the people.

Read more on failure here: https://brainly.com/question/15949912

#SPJ1

What should you install on an operating system to prevent potentially harmful network packets from entering or leaving the os?

Answers

Answer:

A host-based firewall.

Explanation:

Firewalls monitor incoming and outgoing network traffic, and are either network-based or host-based. As you are trying to protect the OS, a host-based firewall is used as it runs on the host itself, rather than on the network.

Other Questions
A gas sample occupies 10. 28 l at 8. 34 atm. its volume at 6. 98 atm (assuming constant temperature conditions) is:____.a. 12. 28 b. 8. 60 c. 15. 61 d. 5. 66 Which laboratory department would normally perform a prothrombin time (pt) test? URGENTA 10 M concentrated stock solution of NaCl is used to prepare 3 liters of diluted 1 M solution. Which of the following is true for the process used to achieve the required dilution? The volume of stock solution used is less than 0.2 liters. The volume of stock solution used is less than 3 liters. The volume of the solvent used is less than 0.2 liters. The volume of the solvent used is more than 3 liters. cd+(-6c)=150 when d=4 Describe the rise in television ownership. explain how television was connected to consumer spending in the 1950s. also discuss how television influenced american social and cultural expectations. An investigator who conducts an experiment to determine how changes in pH affect the function of enzymes on digestion is most likely to be a/an __________. histologist neurologist physiologist engineer anatomist The obsessive disinhibition form of a craving is the result of dysfunction in the ___________ neurotransmitter. a. gaba b. 5ht c. da d. op What are the two stages of accounting for a purchase discount using the gross method? (check all that apply.) What is the ""most deadly mistake anyone can do"" during a tornado strike? here is a list of do's and don'ts during tornado strike: The accompanying data are the caloric contents and the sugar contents (in grams) of 11 high-fiber breakfast cereals. Find the equation of the regression line. Then construct ascatter plot of the data and draw the regression line. Then use the regression equation to predict the value of y for each of the given x-values, if meaningful. If the x-value is notmeaningful to predict the value of y, explain why not.(a) x = 160 cal(b)x= 90 cal(c)x= 175 cal(d)x=198 calClick the icon to view the table of caloric and sugar contents. Write an equation that gives the relationship between the cross-sectional area (a), the volume (v), and the thickness of a cylinder. Another part of family planning is exploring fertility. as you have learned in this lesson, infertility can impact a person's plan for starting a family. thinking about your ideas for a family, how would you cope with infertility? discuss how you would go about starting a family. write a story which includes a piece of writing which caused great disapointment or happiness. When reference is made to the _________________________ , it means the specific amount of income needed for a basic standard of living. poverty trap income line income gap poverty line Deion misses 4% of the free throws he attempts in a seaon. how many total free throws did he attempt if he missed 17 If a polynomial function, f(x), with rational coefficients has roots 0, 4, and 3 startroot 11 endroot, what must also be a root of f(x)? _______ are small groups of consumers who interact directly and informally with product designers without a moderator present. Firewood can be sold in cords. the wood is cut into equal lengths and stacked evenly in a rack. which geometric shape can be used as a model to calculate the volume of the cord of wood? Jamal is placed in the remedial reading class at school and labels himself as a bad reader, thereby causing him to read less and not improve his reading. This is an example of the a self-fulfilling prophecy b the fundamental attribution error c. mere exposure effect d. stereotype threat Read the extract from 'The hunting of Shumba' by Kingsley Fairbridge and answer the questions. This poem describes the way Shumba, a lion, hunts his prey. A grass-blade breaking! Swift in awful calm, The mighty limbs at length along the ground; Steel muscles tightening - A sense of harm, Intangible... no shadow of a sound... But savage eyes unveil'd, Intense as death; Purs'd lips and lower'd ears and bated breath, Dread vigour hail'd From every nerve and tissue - crouching there Blent with grass,- incarnate, awful fear ! A leap a scream a thud; And it is done. Silence awhile, and the hot smell of blood. Silence, then slowly, with the sinking sun, The rend of flesh....The crickets wake and sing, The frogs take up their song, the night-jars wing Weird in the azure dusk. As had been will'd, - C IGHLI Identify the figures of speech in the poem